[1]
WANG, X.Z. Fuzzy Measure, Fuzzy Integral, and Their Application in Classification Technique [M]. Beijing: Science Press, 2008. (in Chinese).
Google Scholar
[2]
KE, H.F., CHEN, Y.G. Threat assessment model for the jamming target of electronic warfare based on multiple attribute and multiple hierarchy [J]. Systems Engineering and Electronics, 2006, 28(9): 1370-1374. (in Chinese).
Google Scholar
[3]
WANG, X.Y., LIU, Z.W., HOU, C.Z., ZHANG, C., YUAN, J.M. Method of object threat assessment based on fuzzy MADM [J]. Control and Decision, 2007, 22(8): 859-863. (in Chinese).
Google Scholar
[4]
CAO, K.J. Study on Multi-source Information-based Attribute Fusion and Threat Assessment Technique [D]. Nanjing: PLA University of Science and Technology, 2006. (in Chinese).
Google Scholar
[5]
WANG, X.H., QIN, Z., LIU, Y., SHI, Z.W. RBF Neural Network for Threat Sequencing [J]. Journal of System Simulation, 2004, 16(7): 1576- 1579. (in Chinese).
Google Scholar
[6]
LEI, Y.J., WANG, B.S., LU, Y.L. Techniques for Threat Assessment Based on Adaptive Intuitionistic Fuzzy Reasoning [J]. Journal of Electronics & Information Technology, 2007, 29(12): 2805-2809. (in Chinese).
Google Scholar
[7]
LEI, Y.J., WANG, B.S., WANG, Y. Techniques for Threat Assessment Based on Intuitionistic Fuzzy Reasoning [J]. Journal of Electronics & Information Technology, 2007, 29(9): 2077-2081. (in Chinese).
Google Scholar
[8]
HUANG, J., LI, B.C., ZHAO, Y.J. Target Threat Assessment Based on Choquet integral [J]. Journal of Information Engineering University, 2012, 13(1): 18-21. (in Chinese).
Google Scholar
[9]
ZHAO, L., LIU, Z.M., JIANG, C.S. Research on Confrontation Strategy Algorithm of Terminal Defense System [J]. Journal of Astronautics, 2011, 32(3): 574-581. (in Chinese).
Google Scholar
[10]
CHEN, H., ZHANG, K., CAO, J.S. Target threat assessment based on PSO-BP algorithm [J]. Application Research of Computers, 2012, 29(3), 900-901. (in Chinese).
Google Scholar
[11]
Wang Yi, Sun Yuan, Li Ji-ying. Air Defense Threat Assessment Based on Dynamic Bayesian Network[C]. 2012 International Conference on Systems and Informatics, Yantai, 2012: 721-724.
DOI: 10.1109/icsai.2012.6223112
Google Scholar
[12]
MA, S.D., HAN,L., GONG,G.H., SONG, X. Target threat assessment technology based on cloud model [J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(2): 150-153. (in Chinese).
Google Scholar